Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gain root remotely >> DameWare Mini Remote Control Pre-Authentication Username Buffer Overflow Vulnerability


Vulnerability Assessment Details

DameWare Mini Remote Control Pre-Authentication Username Buffer Overflow Vulnerability

Vulnerability Assessment Summary
Acertains version of DameWare Mini Remote Control (Overflow2)

Detailed Explanation for this Vulnerability Assessment

Summary :

Arbitrary code can be executed on the remote host.

Description :

The remote host is running DameWare Mini Remote Control. The remote
version of this software is vulnerable to a buffer overflow
vulnerability. A possible hacker can exploit this flaw by sending a
specially crafted packet to the remote host. Successful exploitation
of this vulnerability would result in remote code execution.

Solution :

Upgrade to version 4.9.0.0 or later.

Risk Factor :

Critical / CVSS Base Score : 10
(AV:R/AC:L/Au:NR/C:C/A:C/I:C/B:N)

Networks Security ID: 14707

Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2007 Tenable Network Security

Cables, Connectors

DELL Latitude E5440 14" (Intel Core i7 4600U, 2.10GHz, 8GB RAM, 120GB SSD)
$192.5
DELL Latitude E5440 14Dell Inspiron 24 5490 All-In-One 23.8" Touch Screen i7-10510U 512GB SSD 16GB RAM
$824.99
Dell Inspiron 24 5490 All-In-One 23.8Asus 15.6" Q501LA SKhynix SO-DIMM Memory RAM 4GB PC3L-12800S HMT451S6AFR8A-PB
$12.99
Asus 15.6MIXED LOT OF (36) 8GB DDR3 Memory SERVER RAM ECC
$230.99
MIXED LOT OF (36) 8GB DDR3 Memory SERVER RAM ECC picture


Discussions

No Discussions have been posted on this vulnerability.